0x4141414141 / Malware-Devlopment
Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C
☆39Updated 5 years ago
Alternatives and similar repositories for Malware-Devlopment
Users that are interested in Malware-Devlopment are comparing it to the libraries listed below
Sorting:
- Windows Administrator level Implant.☆49Updated 7 months ago
- IAT Unhooking proof-of-concept☆29Updated last year
- Situational Awareness script to identify how and where to run implants☆49Updated 5 months ago
- ☆55Updated 6 months ago
- A small red team course☆37Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ☆48Updated last year
- ☆59Updated last year
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- POC of GITHUB simple C2 in rust☆53Updated 3 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 10 months ago
- in-process powershell runner for BRC4☆45Updated last year
- A pure C version of SymProcAddress☆27Updated last year
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆42Updated last year
- EvtPsst☆53Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆48Updated last year
- ☆37Updated 2 months ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆62Updated last year
- ☆41Updated 10 months ago
- ☆38Updated 2 years ago
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆21Updated 3 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 11 months ago
- Windows Thread Pool Injection Havoc Implementation☆29Updated last year
- ☆36Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year